The IoT is starting to have increasingly bigger impact on business decissions. The effective capture, management and processing of fast data has become a key success factor for many businesses. Data leveraged by cloud-powered C# or PHP back-end applications provide a clear and consistent stream of business inteligence to customers. Securely delivered to the right people at the right time.
Ask me about:
- → Processing and storage of structured, fast data.
- → Parsing and data encryption.
- → Custom application & web development.
- → Database and server administration.
- → Web application security.
MS Azure SQL
I was not always so single pointed. Samples of my previous work, a mixture of web based projects, online marketing campaigns, ads, banners, book-covers, magazines, cartoons, product labels, logos, etc. are available for preview in my PORTFOLIO → . Altough my primary focus for the past few years was mostly on mid-sized applications for processing structured data, I still enjoy graphic design work once in a while to feed my creative side.
From time-to-time I tend to write something related to programming or cyber-security. Feel free to browse.
Most website owners, rely on the perks of organically generated traffic from the major search engines like Google. For some it is a matter of life & death for their business to appear at the top of Google search results and every extra upward placement is merrily celebrated. SEO has become one of Read more…
Ok I get it, there are times you may feel that certain web pages are better to access without anyone actually knowing it was you. But do you really know the risks that you open yourself to? Simply put, proxy is a server that connects you to your url destination. The proxy accesses Read more…
Ignorance of the of lack of security at public hot-spots prevails to be bliss. Standing in a line at the local coffee shop, mulling over a variety of caffeine goodness, and selecting from the available Wi-Fi networks to connect to. But today something is different. The network name (SSID) is present twice. Once Read more…
How many times during the past 6 months someone I know personally called to tell me “MY E-MAIL ACCOUNT GOT HACKED AND I CAN’T LOG-IN!” The loss of your treasured e-mail history and contacts might easily be remedied with a tub of your favorite Ben & Jerry’s and the reluctant acceptance that you will Read more…